In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

AI Tools Are Being Weaponized – Protect Your Organization Now

⚠️ AI Abuse Is Becoming a Cyber Threat Reality

Claude AI and other models are being manipulated to craft phishing and social engineering attacks.

This new frontier allows bad actors to bypass traditional defenses, exploiting human vulnerabilities directly.

Employees unaware of AI-driven manipulation are the most likely to inadvertently aid cybercriminals.

AUMINT.io strengthens human defenses with tailored simulations, personalized training, and dashboards tracking real-time risk.

AI abuse is evolving rapidly – human readiness is your strongest defense: Book Your AUMINT.io Intro
.

#CISO #CTO #CyberSecurity #EnterpriseSecurity #SocialEngineering #ITLeadership

read more

Why Startups Can’t Afford to Ignore Privacy and Cybersecurity

🚀 Startups Under Siege: Cybersecurity Is Not Optional

⚡ 400% more attacks now hit early-stage ventures compared to a few years ago. Startups have become prime targets because criminals know they’re moving fast without strong defenses.

⚡ Investors no longer just ask about growth – they want proof that privacy and cybersecurity are built into your DNA.

⚡ A single phishing email, insider mistake, or weak third-party control can kill a funding round, stall a launch, or destroy customer trust overnight.

🛡️ AUMINT.io empowers startups to fight back with real-world simulations and tailored awareness programs that build resilience without draining resources.

👉 If your startup is scaling, don’t wait for a breach to prove your vulnerabilities. Book a call today
.

#CyberSecurity #Startups #VentureCapital #DataPrivacy #RiskManagement #CISO #Founders #TechLeaders

read more

When Cybersecurity Failures Cost Executives Bonuses

The recent Qantas cyber breach exposed a troubling trend in corporate accountability. While hackers accessed sensitive data, the airline’s executives still received performance bonuses, raising questions about the alignment of incentives and true cyber risk...

read more